Time Left: 00:00

HNS Exam: Build Internet Infrastructure

Instruction: Select the correct answer from the given choices. Each question carries 2 points.

1. What is a key characteristic of the Internet's ownership and structure?

2. Which nonprofit group oversees the policies and protocols that define how we use the Internet?

3. What is the definition of "Internet Infrastructure"?

4. What happens during the network's planning phase?

5. What does the "implementation process" of a network infrastructure involve?

6. What are "business functions"?

7. How has the Internet revolutionized the way companies do business?

8. What is the first step in choosing a suitable business internet connection?

9. When buying a business internet connection, why should you be wary of committing for longer than two years?

10. Which of the following is NOT a chief component of application availability?

11. How is "response time" defined in the context of network user requirements?

12. What is a characteristic of throughput-intensive applications?

13. Which types of organizations require a high level of hardware and topological redundancy due to their need for nearly 100% uptime?

14. Which of the following is a method mentioned for assessing user requirements?

15. What is considered the most expensive and time-consuming method for assessing user requirements?

16. What is a key characteristic of Twisted Pair (TP) cables?

17. How are mail servers categorized?

18. What is the purpose of the `ping` command?

19. Which command-line utility helps to determine the path data takes to a destination?

20. In what notation are IP addresses usually mentioned and demonstrated?

21. What process is a mandate that all information sent on the Internet must use?

22. Why is "access level" an important security mechanism?

23. What social engineering technique involves a victim getting an email from a seemingly reputable source asking for personal account information?

24. What social engineering technique reroutes a request for a legitimate website to a fake site that collects personal information?

25. What is the purpose of an organization's "Security Policy"?